Sciweavers

1486 search results - page 42 / 298
» Firewall Rules Analysis
Sort
View
KDD
2003
ACM
190views Data Mining» more  KDD 2003»
16 years 7 days ago
Distance-enhanced association rules for gene expression
We introduce a novel data mining technique for the analysis of gene expression. Gene expression is the effective production of the protein that a gene encodes. We focus on the cha...
Aleksandar Icev, Carolina Ruiz, Elizabeth F. Ryder
DEDUCTIVE
1994
122views Database» more  DEDUCTIVE 1994»
15 years 1 months ago
A Simple Model for Active Rules and their Behavior in Deductive Databases
Recent advances in non-monotonic semantics of deductive databases provide a simple framework for modeling the even-condition-action rules of active databases. This approach unifie...
Carlo Zaniolo, Reza Sadri
COLING
2008
15 years 1 months ago
ILP-based Conceptual Analysis for Chinese NPs
In this paper, we explore a conceptual resource for Chinese nominal phrases, which allows multi-dependency and distinction between dependency and the corresponding exact relation....
Paul D. Ji, Stephen G. Pulman
SAS
2009
Springer
171views Formal Methods» more  SAS 2009»
16 years 11 days ago
Bottom-Up Shape Analysis
In this paper we present a new shape analysis algorithm. The key distinguishing aspect of our algorithm is that it is completely compositional, bottom-up and non-iterative. We pres...
Bhargav S. Gulavani, Supratik Chakraborty, Ganesan...
ICSE
2008
IEEE-ACM
15 years 12 months ago
Formal concept analysis applied to fault localization
One time-consuming task in the development of software is debugging. Recent work in fault localization crosschecks traces of correct and failing execution traces, it implicitly se...
Peggy Cellier